Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 4 |
Terrorism | 4 |
Computer Software | 2 |
Information Technology | 2 |
Access to Information | 1 |
Barriers | 1 |
Censorship | 1 |
College Faculty | 1 |
College Students | 1 |
Computer Attitudes | 1 |
Computer Interfaces | 1 |
More ▼ |
Source
Association of Small Computer… | 1 |
Chronicle of Higher Education | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Author
Basken, Paul | 1 |
Peslak, Alan R. | 1 |
Plachkinova, Miloslava | 1 |
Smith, Carol L., Ed. | 1 |
Smith, Peter, Ed. | 1 |
Vo, Ace | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
District of Columbia | 1 |
Iran | 1 |
Maryland | 1 |
Massachusetts | 1 |
Pennsylvania | 1 |
South Carolina | 1 |
Ukraine | 1 |
United States | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction